{"id":"https://openalex.org/W4386486831","doi":"https://doi.org/10.1109/isvlsi59464.2023.10238662","title":"An Investigation into the Security of Register Allocation with Spilling and Splitting","display_name":"An Investigation into the Security of Register Allocation with Spilling and Splitting","publication_year":2023,"publication_date":"2023-06-20","ids":{"openalex":"https://openalex.org/W4386486831","doi":"https://doi.org/10.1109/isvlsi59464.2023.10238662"},"language":"en","primary_location":{"id":"doi:10.1109/isvlsi59464.2023.10238662","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isvlsi59464.2023.10238662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014954893","display_name":"Priyanka Panigrahi","orcid":"https://orcid.org/0000-0002-8466-5397"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Priyanka Panigrahi","raw_affiliation_strings":["Indian Institute of Technology Guwahati,Department of Computer Science and Engineering,Guwahati,India","Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Guwahati,Department of Computer Science and Engineering,Guwahati,India","institution_ids":["https://openalex.org/I1317621060"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083752855","display_name":"Chandan Karfa","orcid":"https://orcid.org/0000-0002-3835-4184"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Chandan Karfa","raw_affiliation_strings":["Indian Institute of Technology Guwahati,Department of Computer Science and Engineering,Guwahati,India","Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Guwahati,Department of Computer Science and Engineering,Guwahati,India","institution_ids":["https://openalex.org/I1317621060"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, India","institution_ids":["https://openalex.org/I1317621060"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014954893"],"corresponding_institution_ids":["https://openalex.org/I1317621060"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10864587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7818090915679932},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.7542625665664673},{"id":"https://openalex.org/keywords/register-allocation","display_name":"Register allocation","score":0.7156534194946289},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6269359588623047},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.5611703991889954},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.540108859539032},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4292770326137543},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18992367386817932}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7818090915679932},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.7542625665664673},{"id":"https://openalex.org/C128916667","wikidata":"https://www.wikidata.org/wiki/Q1343660","display_name":"Register allocation","level":3,"score":0.7156534194946289},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6269359588623047},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.5611703991889954},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.540108859539032},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4292770326137543},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18992367386817932},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isvlsi59464.2023.10238662","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isvlsi59464.2023.10238662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W190884830","https://openalex.org/W1531820677","https://openalex.org/W1680927362","https://openalex.org/W1978364288","https://openalex.org/W2003804316","https://openalex.org/W2014589945","https://openalex.org/W2129278597","https://openalex.org/W2140191557","https://openalex.org/W2142995156","https://openalex.org/W2155877593","https://openalex.org/W2162022335","https://openalex.org/W2517608959","https://openalex.org/W2747928832","https://openalex.org/W2748772204","https://openalex.org/W2760025382","https://openalex.org/W2897147955","https://openalex.org/W2961430100","https://openalex.org/W3021250941","https://openalex.org/W3148529197","https://openalex.org/W4285308796","https://openalex.org/W4292825293","https://openalex.org/W4367016600","https://openalex.org/W6683952262"],"related_works":["https://openalex.org/W4297672591","https://openalex.org/W4390073573","https://openalex.org/W2155935413","https://openalex.org/W2755854447","https://openalex.org/W2091058226","https://openalex.org/W1581500142","https://openalex.org/W1490610520","https://openalex.org/W2151326751","https://openalex.org/W2025840053","https://openalex.org/W2365469275"],"abstract_inverted_index":{"Compiler":[0],"optimization":[1,15],"can":[2,87],"be":[3],"functionally":[4],"correct":[5],"but":[6],"not":[7],"secure.":[8],"Register":[9],"allocation":[10,71],"(RA)":[11],"is":[12,55,59,74,113],"an":[13],"essential":[14],"performed":[16],"by":[17],"a":[18,122],"compiler.":[19],"This":[20],"paper":[21],"analyzes":[22],"the":[23,33,130,144],"security":[24,35],"threat":[25],"of":[26,48,132,146],"RA":[27,54,86,110,124],"concerning":[28],"information":[29,42,90],"flow.":[30,43],"We":[31,66],"define":[32],"relative":[34,49],"between":[36],"two":[37],"programs":[38],"with":[39,72],"respect":[40],"to":[41,45,89],"According":[44],"our":[46,79,102,147],"definition":[47],"security,":[50],"we":[51,83,120],"show":[52,68,84,108],"that":[53,69,85,109,128],"secure":[56,76,123],"when":[57],"there":[58],"no":[60],"splitting":[61,73],"and":[62],"spilling":[63,93],"into":[64],"memory.":[65,100],"also":[67,75],"register":[70],"based":[77],"on":[78,105,140],"attack":[80],"model.":[81],"Then,":[82],"lead":[88],"leaks":[91,98,134],"during":[92,135],"as":[94],"it":[95],"introduces":[96],"new":[97,133],"through":[99],"Further,":[101],"experimental":[103,138],"results":[104],"various":[106,141],"benchmarks":[107,142],"in":[111,126],"LLVM":[112,127],"actually":[114],"leaky.":[115],"To":[116],"address":[117],"this":[118],"vulnerability,":[119],"propose":[121],"approach":[125],"mitigates":[129],"risk":[131],"spilling.":[136],"Our":[137],"evaluation":[139],"shows":[143],"effectiveness":[145],"proposed":[148],"approach.":[149]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
